مشروع البحث: A Validity-Based Approach for Feature Selection in Intrusion Detection Systems
dc.contributor.advisor | Dr. Wei Li | |
dc.date.accessioned | 2025-10-14T09:57:45Z | |
dc.date.available | 2025-10-14T09:57:45Z | |
dc.description | A signature-based system detects attacks based on comparing network data to known attacks, which are labeled as signatures in a database. An anomaly-based system detects intrusions based on deviations from normal user activities and is able to detect novel attacks without prior knowledge (Patcha & Park, 2007). In a network-based IDS, in order to identify anomalous traffic to networks, all packets throughout the network are classified to verify if the data contains any malicious activity or not. | |
dc.description.abstract | An intrusion is outlined as any sequence of actions that compromise the confidentiality, integrity, or availability of a network or a host. Intrusion detection is a process of tracking and monitoring the passing of information and identifying malicious activities. Intrusion detection systems (IDS) are defense systems that detect anomalous activities. A network IDS has the capability to provide an overview of unusual behavior and issue alerts to inform the network administrators and terminate a suspected connection (Zhang & Lee, 2000). Intrusion detection systems function through either network-based or host-based intrusion detection techniques (Ahmed et al., 2016). | |
dc.identifier | 781 | |
dc.identifier.uri | https://dspace.academy.edu.ly/handle/123456789/1807 | |
dc.subject | Detection Systems | |
dc.title | A Validity-Based Approach for Feature Selection in Intrusion Detection Systems | |
dspace.entity.type | Project | |
project.endDate | 2022 | |
project.funder.name | علوم حاسب الي | |
project.investigator | الجيلاني محمد الجيلاني حمودة | |
project.startDate | 2021 |